{"id":82305,"date":"2024-09-18T13:19:00","date_gmt":"2024-09-18T13:19:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82305"},"modified":"2024-09-30T06:49:14","modified_gmt":"2024-09-30T06:49:14","slug":"medtech-security-protecting-connected-healthcare-ensuring-compliance","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/","title":{"rendered":"MedTech Security: Protecting Connected Healthcare and Ensuring Compliance\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82305\" class=\"elementor elementor-82305\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0dd8724 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0dd8724\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-886430f\" data-id=\"886430f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ca76d3 elementor-widget elementor-widget-text-editor\" data-id=\"1ca76d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong> September 18, 2024<\/p>\n<p><strong>Time:<\/strong> 7:00 PM IST | 9:30 AM EDT | 8:30 AM CDT<br>\n<strong>Topic:<\/strong> MedTech Security: Protecting Connected Healthcare and Ensuring Compliance<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> The healthcare industry\u2019s increasing reliance on digital technologies makes it an essential target for ransomware attacks. However, with advancements in life-saving devices and implants, threats have evolved from mere service disruptions to directly affecting critical care. From protecting sensitive patient data to ensuring device integrity, security for medical devices must advance to safeguard connected healthcare technologies. This webinar will explore the latest security trends, challenges, and regulatory frameworks in the healthcare sector, focusing on medical devices and information security in a rapidly evolving digital landscape. Additionally, it will highlight vulnerabilities unique to connected healthcare networks, the risks associated with cyber threats, and the strategies needed to mitigate them. Further, it will also cover a proactive approach to threat management and compliance with both national and global regulations.<\/span><br><\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding cybersecurity risks for medical devices<\/li>\n<li>Exploring the latest trends and challenges in healthcare cybersecurity<\/li>\n<li>Navigating regulatory requirements and ensuring compliance while maintaining functionality<\/li>\n<li>Implementing best practices for securing medical devices and patient data<\/li>\n<li>Enhancing incident response and threat intelligence in healthcare<\/li>\n<li>Adopting a proactive approach to risk management for medical devices<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/08\/Amol-Kodag.png\" alt=\"Amol Kodag\" width=\"200\"><strong>Amol Kodag<\/strong>,Engineering Director \u2013 R&amp;D &amp; Head, Cardiovascular Portfolio, Medtronic Engineering and Innovation Center<\/p>\n<p><strong>Bio:<\/strong> Amol Kodag is a seasoned MedTech and Technology R&amp;D executive with over two decades of experience driving innovation and leading engineering teams in the medical &amp; technology sector. As the Director of Engineering and Head of the Cardiovascular Portfolio at Medtronic Engineering &amp; Innovation Center, Amol has been at the forefront of developing cutting-edge connected care solutions and integrating advanced technologies such as AI\/ML and IoT into life-saving medical devices. His extensive knowledge spans global R&amp;D leadership, digital transformation, and product security, ensuring compliance with stringent regulatory standards.<br>\nThroughout his career, Amol has demonstrated a deep commitment to enhancing patient and clinician outcomes through secure and reliable technology solutions. Recognized for his leadership in cybersecurity initiatives, he has successfully led teams in building robust security frameworks for enterprise software and connected intelligent solutions. Amol is a sought-after speaker and thought leader in the tech industry, sharing his expertise at global conferences and webinars on critical topics such as security and IoT.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><\/p>\n<a name=\"attend\"><\/a>\n\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/z9-fUEiuaYs?si=LmopRni8KU7FTWI7\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: September 18, 2024 Time: 7:00 PM IST | 9:30 AM EDT | 8:30 AM CDT Topic: MedTech Security: Protecting Connected Healthcare and Ensuring Compliance Watch Now Abstract: The healthcare industry\u2019s increasing reliance on digital technologies makes it an essential target for ransomware attacks. However, with advancements in life-saving devices and implants, threats have evolved&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82306,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82305","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Connected Medical Devices: Ensuring Safety and Compliance<\/title>\n<meta name=\"description\" content=\"Learn about securing medical devices in healthcare. Explore trends, challenges, and regulations to protect patient data and device integrity against evolving cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MedTech Security: Protecting Connected Healthcare and Ensuring Compliance\u00a0\" \/>\n<meta property=\"og:description\" content=\"Learn about securing medical devices in healthcare. Explore trends, challenges, and regulations to protect patient data and device integrity against evolving cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-18T13:19:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-30T06:49:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/08\/465-310-1-17.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"MedTech Security: Protecting Connected Healthcare and Ensuring Compliance\u00a0\",\"datePublished\":\"2024-09-18T13:19:00+00:00\",\"dateModified\":\"2024-09-30T06:49:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/\"},\"wordCount\":416,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/465-310-1-17.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/\",\"name\":\"Securing Connected Medical Devices: Ensuring Safety and Compliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/465-310-1-17.png\",\"datePublished\":\"2024-09-18T13:19:00+00:00\",\"dateModified\":\"2024-09-30T06:49:14+00:00\",\"description\":\"Learn about securing medical devices in healthcare. Explore trends, challenges, and regulations to protect patient data and device integrity against evolving cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/465-310-1-17.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/465-310-1-17.png\",\"width\":1396,\"height\":930,\"caption\":\"Medical Device Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/medtech-security-protecting-connected-healthcare-ensuring-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"MedTech Security: Protecting Connected Healthcare and Ensuring Compliance\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Connected Medical Devices: Ensuring Safety and Compliance","description":"Learn about securing medical devices in healthcare. Explore trends, challenges, and regulations to protect patient data and device integrity against evolving cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/","og_locale":"en_US","og_type":"article","og_title":"MedTech Security: Protecting Connected Healthcare and Ensuring Compliance\u00a0","og_description":"Learn about securing medical devices in healthcare. Explore trends, challenges, and regulations to protect patient data and device integrity against evolving cyber threats.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-09-18T13:19:00+00:00","article_modified_time":"2024-09-30T06:49:14+00:00","og_image":[{"width":1396,"height":930,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/08\/465-310-1-17.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"MedTech Security: Protecting Connected Healthcare and Ensuring Compliance\u00a0","datePublished":"2024-09-18T13:19:00+00:00","dateModified":"2024-09-30T06:49:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/"},"wordCount":416,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/08\/465-310-1-17.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/","name":"Securing Connected Medical Devices: Ensuring Safety and Compliance","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/08\/465-310-1-17.png","datePublished":"2024-09-18T13:19:00+00:00","dateModified":"2024-09-30T06:49:14+00:00","description":"Learn about securing medical devices in healthcare. Explore trends, challenges, and regulations to protect patient data and device integrity against evolving cyber threats.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/08\/465-310-1-17.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/08\/465-310-1-17.png","width":1396,"height":930,"caption":"Medical Device Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/medtech-security-protecting-connected-healthcare-ensuring-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"MedTech Security: Protecting Connected Healthcare and Ensuring Compliance\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82305"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82305\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82306"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}